STIGQter STIGQter: STIG Summary:

Container Platform Security Requirements Guide

Version: 1

Release: 1 Benchmark Date: 20 Nov 2020

CheckedNameTitle
SV-233015r599509_ruleThe container platform must use TLS 1.2 or greater for secure container image transport from trusted sources.
SV-233016r599509_ruleThe container platform must use TLS 1.2 or greater for secure communication.
SV-233019r599509_ruleThe container platform must use a centralized user management solution to support account management functions.
SV-233020r599509_ruleThe container platform must automatically remove or disable temporary user accounts after 72 hours.
SV-233021r599509_ruleThe container platform must automatically disable accounts after a 35-day period of account inactivity.
SV-233022r599509_ruleThe container platform must automatically audit account creation.
SV-233023r599509_ruleThe container platform must automatically audit account modification.
SV-233024r599509_ruleThe container platform must automatically audit account-disabling actions.
SV-233025r599509_ruleThe container platform must automatically audit account removal actions.
SV-233026r599511_ruleLeast privilege access and need to know must be required to access the container platform registry.
SV-233027r599509_ruleLeast privilege access and need to know must be required to access the container platform runtime.
SV-233028r599509_ruleLeast privilege access and need to know must be required to access the container platform keystore.
SV-233029r599513_ruleThe container platform must enforce approved authorizations for controlling the flow of information within the container platform based on organization-defined information flow control policies.
SV-233030r599509_ruleThe container platform must enforce approved authorizations for controlling the flow of information between interconnected systems and services based on organization-defined information flow control policies.
SV-233031r599515_ruleThe container platform must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
SV-233032r599517_ruleThe container platform must display the Standard Mandatory DoD Notice and Consent Banner before granting access to platform components.
SV-233033r599519_ruleThe container platform must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage and conditions and take explicit actions to log on for further access.
SV-233038r599521_ruleThe container platform must generate audit records for all DoD-defined auditable events within all components in the platform.
SV-233039r599523_ruleThe container platform must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
SV-233040r599525_ruleThe container platform must generate audit records when successful/unsuccessful attempts to access privileges occur.
SV-233041r599714_ruleThe container platform must initiate session auditing upon startup.
SV-233042r599529_ruleAll audit records must identify what type of event has occurred within the container platform.
SV-233043r599531_ruleThe container platform audit records must have a date and time association with all events.
SV-233044r599533_ruleAll audit records must identify where in the container platform the event occurred.
SV-233045r599535_ruleAll audit records must identify the source of the event within the container platform.
SV-233046r599537_ruleAll audit records must generate the event results within the container platform.
SV-233047r599539_ruleAll audit records must identify any users associated with the event within the container platform.
SV-233048r599541_ruleAll audit records must identify any containers associated with the event within the container platform.
SV-233049r599543_ruleThe container platform must generate audit records containing the full-text recording of privileged commands or the individual identities of group account users.
SV-233051r599704_ruleThe container platform must take appropriate action upon an audit failure.
SV-233052r599547_ruleThe container platform components must provide the ability to send audit logs to a central enterprise repository for review and analysis.
SV-233055r599509_ruleThe container platform must use internal system clocks to generate audit record time stamps.
SV-233056r599509_ruleThe container platform must protect audit information from any type of unauthorized read access.
SV-233057r599509_ruleThe container platform must protect audit information from unauthorized modification.
SV-233058r599509_ruleThe container platform must protect audit information from unauthorized deletion.
SV-233059r599509_ruleThe container platform must protect audit tools from unauthorized access.
SV-233060r599509_ruleThe container platform must protect audit tools from unauthorized modification.
SV-233061r599509_ruleThe container platform must protect audit tools from unauthorized deletion.
SV-233063r599549_ruleThe container platform must use FIPS validated cryptographic mechanisms to protect the integrity of log information.
SV-233064r599551_ruleThe container platform must be built from verified packages.
SV-233065r599553_ruleThe container platform must verify container images.
SV-233066r599715_ruleThe container platform must limit privileges to the container platform registry.
SV-233067r599557_ruleThe container platform must limit privileges to the container platform runtime.
SV-233068r599716_ruleThe container platform must limit privileges to the container platform keystore.
SV-233069r599509_ruleConfiguration files for the container platform must be protected.
SV-233070r599509_ruleAuthentication files for the container platform must be protected.
SV-233071r599509_ruleThe container platform must be configured with only essential configurations.
SV-233072r599509_ruleThe container platform registry must contain only container images for those capabilities being offered by the container platform.
SV-233073r599561_ruleThe container platform runtime must enforce ports, protocols, and services that adhere to the PPSM CAL.
SV-233074r599563_ruleThe container platform runtime must enforce the use of ports that are non-privileged.
SV-233075r599509_ruleThe container platform must uniquely identify and authenticate users.
SV-233076r599509_ruleThe container platform application program interface (API) must uniquely identify and authenticate users.
SV-233077r599509_ruleThe container platform must uniquely identify and authenticate processes acting on behalf of the users.
SV-233078r599565_ruleThe container platform application program interface (API) must uniquely identify and authenticate processes acting on behalf of the users.
SV-233079r599567_ruleThe container platform must use multifactor authentication for network access to privileged accounts.
SV-233080r599569_ruleThe container platform must use multifactor authentication for network access to non-privileged accounts.
SV-233081r599509_ruleThe container platform must use multifactor authentication for local access to privileged accounts.
SV-233082r599509_ruleThe container platform must use multifactor authentication for local access to non-privileged accounts.
SV-233083r599571_ruleThe container platform must ensure users are authenticated with an individual authenticator prior to using a group authenticator.
SV-233084r599573_ruleThe container platform must use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.
SV-233085r599575_ruleThe container platform must implement replay-resistant authentication mechanisms for network access to non-privileged accounts.
SV-233086r599577_ruleThe container platform must uniquely identify all network-connected nodes before establishing any connection.
SV-233087r599579_ruleThe container platform must disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
SV-233088r599509_ruleThe container platform must enforce a minimum 15-character password length.
SV-233089r599509_ruleThe container platform must prohibit password reuse for a minimum of 10 generations.
SV-233090r599581_ruleThe container platform must enforce password complexity by requiring that at least one uppercase character be used.
SV-233091r599583_ruleThe container platform must enforce password complexity by requiring that at least one lowercase character be used.
SV-233092r599585_ruleThe container platform must enforce password complexity by requiring that at least one numeric character be used.
SV-233093r599587_ruleThe container platform must enforce password complexity by requiring that at least one special character be used.
SV-233094r599589_ruleThe container platform must require the change of at least 15 of the total number of characters when passwords are changed.
SV-233095r599591_ruleFor container platform using password authentication, the application must store only cryptographic representations of passwords.
SV-233096r599509_ruleFor accounts using password authentication, the container platform must use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process.
SV-233097r599509_ruleThe container platform must enforce 24 hours (one day) as the minimum password lifetime.
SV-233098r599509_ruleThe container platform must enforce a 60-day maximum password lifetime restriction.
SV-233101r599509_ruleThe container platform must map the authenticated identity to the individual user or group account for PKI-based authentication.
SV-233102r599593_ruleThe container platform must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
SV-233105r599595_ruleThe container platform must provide an audit reduction capability that supports on-demand reporting requirements.
SV-233106r599597_ruleThe container platform must employ strong authenticators in the establishment of non-local maintenance and diagnostic sessions.
SV-233114r599599_ruleThe container platform must separate user functionality (including user interface services) from information system management functionality.
SV-233118r599601_ruleThe container platform must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 security requirements for cryptographic modules.
SV-233122r599603_ruleThe container platform runtime must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
SV-233123r599509_ruleThe container platform must preserve any information necessary to determine the cause of the disruption or failure.
SV-233125r599605_ruleThe container platform runtime must isolate security functions from non-security functions.
SV-233126r599509_ruleThe container platform must never automatically remove or disable emergency accounts.
SV-233127r599607_ruleThe container platform must prohibit containers from accessing privileged resources.
SV-233128r599705_ruleThe container platform must prevent unauthorized and unintended information transfer via shared system resources.
SV-233129r599611_ruleThe container platform must restrict individuals' ability to launch organizationally defined denial-of-service (DoS) attacks against other information systems.
SV-233133r599613_ruleThe container platform must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
SV-233142r599509_ruleThe container platform must use cryptographic mechanisms to protect the integrity of audit tools.
SV-233143r599509_ruleThe container platform must notify system administrators and ISSO when accounts are created.
SV-233144r599509_ruleThe container platform must notify system administrators and ISSO when accounts are modified.
SV-233145r599509_ruleThe container platform must notify system administrators and ISSO for account disabling actions.
SV-233146r599509_ruleThe container platform must notify system administrators and ISSO for account removal actions.
SV-233149r599509_ruleAccess to the container platform must display an explicit logout message to user indicating the reliable termination of authenticated communication sessions.
SV-233155r599509_ruleThe container platform must terminate shared/group account credentials when members leave the group.
SV-233156r599615_ruleThe container platform must enforce organization-defined circumstances and/or usage conditions for organization-defined accounts.
SV-233157r599509_ruleThe container platform must automatically audit account-enabling actions.
SV-233158r599509_ruleThe container platform must notify system administrator and ISSO of account enabling actions.
SV-233162r599617_ruleThe container platform must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
SV-233163r599619_ruleContainer images instantiated by the container platform must execute using least privileges.
SV-233164r599509_ruleThe container platform must audit the execution of privileged functions.
SV-233165r599621_ruleThe container platform must automatically lock an account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded.
SV-233166r599712_ruleThe container platform must provide the configuration for organization-identified individuals or roles to change the auditing to be performed on all components, based on all selectable event criteria within organization-defined time thresholds.
SV-233168r599625_ruleThe container platform must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
SV-233169r599627_ruleAudit records must be stored at a secondary location.
SV-233170r599629_ruleThe container platform must provide an immediate warning to the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity.
SV-233171r599631_ruleThe container platform must provide an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events requiring real-time alerts.
SV-233181r599509_ruleAll audit records must use UTC or GMT time stamps.
SV-233182r599509_ruleThe container platform must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.
SV-233184r599633_ruleThe container platform must prohibit the installation of patches and updates without explicit privileged status.
SV-233185r599635_ruleThe container platform runtime must prohibit the instantiation of container images without explicit privileged status.
SV-233186r599509_ruleThe container platform registry must prohibit installation or modification of container images without explicit privileged status.
SV-233188r599724_ruleThe container platform must enforce access restrictions for container platform configuration changes.
SV-233189r599509_ruleThe container platform must enforce access restrictions and support auditing of the enforcement actions.
SV-233190r599509_ruleAll non-essential, unnecessary, and unsecure DoD ports, protocols, and services must be disabled in the container platform.
SV-233191r599639_ruleThe container platform must prevent component execution in accordance with organization-defined policies regarding software program usage and restrictions, and/or rules authorizing the terms and conditions of software program usage.
SV-233192r599641_ruleThe container platform registry must employ a deny-all, permit-by-exception (whitelist) policy to allow only authorized container images in the container platform.
SV-233193r599509_ruleThe container platform must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
SV-233194r599643_ruleThe container platform must require devices to reauthenticate when organization-defined circumstances or situations requiring reauthentication.
SV-233195r599509_ruleThe container platform must be configured to use multi-factor authentication for user authentication.
SV-233199r599645_ruleThe container platform must allow the use of a temporary password for system logons with an immediate change to a permanent password.
SV-233200r599647_ruleThe container platform must prohibit the use of cached authenticators after an organization-defined time period.
SV-233201r599649_ruleThe container platform, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
SV-233202r599509_ruleThe container platform must accept Personal Identity Verification (PIV) credentials from other federal agencies.
SV-233206r599651_ruleThe container platform must audit non-local maintenance and diagnostic sessions' organization-defined audit events associated with non-local maintenance.
SV-233207r599717_ruleContainer platform applications and Application Program Interfaces (API) used for nonlocal maintenance sessions must use FIPS-validated keyed-hash message authentication code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications.
SV-233208r599720_ruleThe container platform must configure web management tools and Application Program Interfaces (API) with FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions.
SV-233210r599509_ruleVulnerability scanning applications must implement privileged access authorization to all container platform components, containers, and container images for selected organization-defined vulnerability scanning activities.
SV-233211r599655_ruleThe container platform must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
SV-233220r599509_ruleThe container platform keystore must implement encryption to prevent unauthorized disclosure of information at rest within the container platform.
SV-233221r599657_ruleThe container platform runtime must maintain separate execution domains for each container by assigning each container a separate address space.
SV-233222r599659_ruleThe container platform must protect against or limit the effects of all types of denial-of-service (DoS) attacks by employing organization-defined security safeguards.
SV-233226r599661_ruleThe container platform must maintain the confidentiality and integrity of information during preparation for transmission.
SV-233227r599663_ruleThe container platform must maintain the confidentiality and integrity of information during reception.
SV-233228r599665_ruleThe container platform must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
SV-233229r599509_ruleThe container platform must implement organization-defined security safeguards to protect system CPU and memory from resource depletion and unauthorized code execution.
SV-233230r599706_ruleThe container platform must remove old components after updated versions have been installed.
SV-233231r599707_ruleThe container platform registry must remove old container images after updating versions have been made available.
SV-233233r599671_ruleThe container platform registry must contain the latest images with most recent updates and execute within the container platform runtime as authorized by IAVM, CTOs, DTMs, and STIGs.
SV-233234r599673_ruleThe container platform runtime must have updates installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
SV-233242r599675_ruleThe organization-defined role must verify correct operation of security functions in the container platform.
SV-233243r599708_ruleThe container platform must perform verification of the correct operation of security functions: upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days. Security functionality includes, but is not limited to, establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters.
SV-233244r599722_ruleThe container platform must provide system notifications to the system administrator and operational staff when anomalies in the operation of the organization-defined security functions are discovered.
SV-233252r599509_ruleThe container platform must generate audit records when successful/unsuccessful attempts to access security objects occur.
SV-233253r599509_ruleThe container platform must generate audit records when successful/unsuccessful attempts to access security levels occur.
SV-233254r599509_ruleThe container platform must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
SV-233255r599509_ruleThe container platform must generate audit records when successful/unsuccessful attempts to modify privileges occur.
SV-233256r599509_ruleThe container platform must generate audit records when successful/unsuccessful attempts to modify security objects occur.
SV-233257r599509_ruleThe container platform must generate audit records when successful/unsuccessful attempts to modify security levels occur.
SV-233258r599509_ruleThe container platform must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
SV-233259r599509_ruleThe container platform must generate audit records when successful/unsuccessful attempts to delete privileges occur.
SV-233260r599509_ruleThe container platform must generate audit records when successful/unsuccessful attempts to delete security levels occur.
SV-233261r599509_ruleThe container platform must generate audit records when successful/unsuccessful attempts to delete security objects occur.
SV-233262r599509_ruleThe container platform must generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur.
SV-233263r599726_ruleThe container platform must generate audit records when successful/unsuccessful logon attempts occur.
SV-233264r599509_ruleThe container platform must generate audit record for privileged activities.
SV-233265r599683_ruleThe container platform audit records must record user access start and end times.
SV-233266r599685_ruleThe container platform must generate audit records when concurrent logons from different workstations and systems occur.
SV-233267r599727_ruleThe container platform runtime must generate audit records when successful/unsuccessful attempts to access objects occur.
SV-233268r599509_ruleDirect access to the container platform must generate audit records.
SV-233269r599728_ruleThe container platform must generate audit records for all account creations, modifications, disabling, and termination events.
SV-233270r599691_ruleThe container runtime must generate audit records for all container execution, shutdown, restart events, and program initiations.
SV-233271r599729_ruleThe container platform must use a valid FIPS 140-2 approved cryptographic modules to generate hashes.
SV-233273r599695_ruleContainer platform components must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
SV-233274r599730_ruleThe container platform must be able to store and instantiate industry standard container images.
SV-233275r599509_ruleThe container platform must continuously scan components, containers, and images for vulnerabilities.
SV-233276r599509_ruleThe container platform must prohibit communication using TLS versions 1.0 and 1.1, and SSL 2.0 and 3.0.
SV-233284r599699_ruleThe container platform must validate certificates used for Transport Layer Security (TLS) functions by performing an RFC 5280-compliant certification path validation.
SV-233285r599701_ruleThe container platform must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use).
SV-233289r599509_ruleThe container platform must use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality.
SV-233290r599703_ruleThe container platform must prohibit or restrict the use of protocols that transmit unencrypted authentication information or use flawed cryptographic algorithms for transmission.